Search Results - (( ict computer based algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- computer based »
- ict computer »
-
1
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…The current parametric encryption algorithms suffer the unconventional and paranormal attacks. …”
Get full text
Get full text
Proceeding Paper -
3
Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language
Published 2019“…Computational thinking or CT refers to the thought processes involved in expressing solutions as computational steps or algorithms that can be carried out by a computer. …”
Get full text
Get full text
Get full text
Article -
4
A proposed framework for fish behaviors based on boid simulator
Published 2016Get full text
Get full text
Conference or Workshop Item -
5
Algorithm as a problem solving technique for teaching and learning of the Malay language
Published 2019“…Computational thinking or CT refers to the thought processes involved in expressing solutions as computational steps or algorithms that can be carried out by a computer. …”
Get full text
Get full text
Get full text
Article -
6
A bit-serial architecture for a multiplierless DCT
Published 2003Get full text
Get full text
Get full text
Article -
7
Energy saving monitoring using fuzzy logic for computing lab
Published 2019“…In this paper, a brief overview on Green ICT implementation in IIUM computer lab by the help of energy audit in ICT lab, survey questionnaires and interview sessions. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Frameworks for a computational Isnad authentication and mechanism development
Published 2016Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
On network flow problems with convex cost
Published 2004Get full text
Get full text
Get full text
Article -
10
A Bayesian probability model for Android malware detection
Published 2022Get full text
Get full text
Get full text
Article -
11
Text categorization using naive bayes algorithm
Published 2006Get full text
Get full text
Conference or Workshop Item -
12
-
13
Task-based assessment on various optimization protocols of computed tomography Pulmonary Angiography examination
Published 2021“…This prospective study was designed to assess CT performance by using the task-based image quality assessment and to identify the influence of iterative reconstruction (IR) algorithm, tube potential and pitch factor selection on dose and image quality during Computed Tomography Pulmonary Angiography (CTPA) examination. …”
Get full text
Get full text
Get full text
Article -
14
A Bayesian probability model for Android malware detection
Published 2021Get full text
Get full text
Get full text
Article -
15
-
16
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…Due to the rapid changes in Information Communication Technology (ICT) devices such as mobile phones, TVs and personal computers have different capabilities to support various file formats of multimedia contents. …”
Get full text
Get full text
Research Reports -
17
Web cluster load balancing via genetic-fuzzy based algorithm
Published 2007Get full text
Get full text
Get full text
Article -
18
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
Get full text
Get full text
Get full text
Article -
19
-
20
